Security expert Winn Schwartau, and The Security AwarenessCompany (SAC), releases its newest multi-media training course "Mobile Security 2012" to the private and public sectors.
The Mobile Security Awareness Course was designed fornon-technical users.As companies increasingly use smartphone and tablets in addition to laptops for their remote workforce, their users need to understand the increased risks theseintelligent endpoints present to the user, his or her privacy, thecompany, its data and regulatory responsibilities.
In 2009, Schwartau began warning the industry about the PerfectStorm of mobile security, and the coming smart phone that he dubs,Cyberwar-4G. "Mobile devices are not phones. They are computers,powerful, small, that happen to also offer voice communications.Users and companies alike must learn the good, the bad and the uglyabout attaching these devices to their networks."
The new Mobile Security course touches on every issue users,executives and IT professionals care about."And so much ofit comes down to 'Consumerization of the Enterprise Network', alsoknown as "to BYOD or not to BYOD?"for mobile device," saysSchwartau. "How do you securely manage and control a device thatcontains both personal and business information - yet was neverdesigned to do so?"
The security problems are not obvious, and every mobileenterprise user needs to get a fast handle on what they are doing,what they should be doing, and most importantly, what they shouldNOT be doing.
Phishing attacks and scams are moving to mobile platforms at analarming rate. "The mobile threat is real as we deploy 20 billionsmart devices by 2020 and tens of billions of apps - the mostefficient malware distribution system ever invented by man," saidRob Smith, CTO of MAD Partners.
The course covers risk, compliance, iOS and Android devices, thethreats from organized crime and mobile crime stats with a strongfocus on hostile mobile apps. It also discusses the state of theart for mobile WiFi, VoIP, data protection, voice mail andencryption techniques. The differences between laptop andphone/tablet mobile security are explained simply, for the averageuser to understand.
Excerpts and previews of the course are available at: http://thesecurityawarenesscompany.com/Mobile%20Security%205%20Slide%20Demo/player.html
Most Popular Stories
- Bipartisan Budget Deal Gets Key Support in House
- GM to Stop Making Autos in Australia
- Clinton to Keynote Annual Simmons Leadership Conference
- Bitcoin Clones Lurch Onto Financial Scene
- Selena Gomez, Shakira Among Top Hispanic Searches
- How Bitcoin and Other Cryptocurrencies Work
- PhD Project Grooms Business Profs
- It's Primary Time in Texas
- How to Survive a Subzero Stranding
- N.M. Dems Say Nonprofit Helping Martinez Campaign